Cyber-Resilience and privileged access management (PAM) will be front and center April 26, 2016 at ISACA’s Central Arkansas Chapter with a full-day seminar from Dan Beckett, one of our Managing Partners.

Two weeks ago I stood before a conference crowd at Cyber Security World 2015 and said: “I hate the term cybersecurity.” And proceeded to give essentially the same presentation that we’ll now bring to all of you through… Continue reading →

As I suggested in my CSA Privacy Heat Index post, the extraordinary volume of privacy abuses in the U.S. may be due not only to its permissive regulations on personal data sharing, but also to its dominance of online… Continue reading →

They came in the morning. Over 800 emails, John said. Looking like the ones in the picture below. John was concerned but relieved that he’d enabled the WordPress plugin “Limit Login Attempts.” He said his company’s web… Continue reading →

We founded and ran the Burton Group identity management and security consulting practices closely-mapped to Reference Architecture decision support frameworks. After performing hundreds of engagements for Global 1000 companies, universities and government entities we now bring our expertise and industry connections to Security Architects Partners and its clients.

Our mission is to deliver high-quality security consulting and education services to enterprise security clients within commercial organizations, higher-education, government and solution provider environments through a team of expert and trusted security architects.